cysa+2
問題一覧
1
Data management policy
2
Geographic access requirements
3
VPN
4
Use built-in functions from libraries to check and handle long numbers properly.
5
Implement port security with one MAC address per network port of the switch.
6
Contact the application owner for connect.example.local for additional information.
7
dd if=ldev/sda of=/mnt/usb/evidence.bin bs=4096; sha512sum /mnt/usblevidence.bin hashlog-Imnt/usblevidence.bin.hashlog Imnt/usblevidence.bin.hash
8
Review the message in a secure environment.
9
Set up a VPN between Company A and Company B, granting access only to the ERPS within the connection.
10
A risk identification process
11
Data enrichment
12
Remove rules 1, 2, and 5.
13
Information is leaking from the memory of host 10.20.30.40
14
DLP
15
802.1X to enforce company policy on BYOD user hardware
16
SSO
17
The IDS rule set
18
output encoding.
19
The company is accepting the inherent risk of the vulnerability.
20
SOAR reduces the amount of human intervention required.
21
The data laws of the country in which the company is located
22
Update lo the secure hypervisor version.
23
Documenting the respective chain of custody, Performing a memory dump of the mobile device for analysis
24
192.168.48.147
25
Spoofing tampering, repudiation, information disclosure, denial of service elevation of privilege
26
Nessus
27
Policy-based access controls
28
an application stress test.
29
Implement a secure supply chain program with governance
30
Spider, Jackal
31
Stack counting
32
Create a data minimization plan.
33
Isolate the container from production using a predefined policy template
34
Enable the browser's XSS filter.
35
Recognize that error messaging does not provide confirmation of the correct element of authentication
36
C.B.A.D
37
Check if temporary files are being monitored
38
SOAR has a wider breadth of capability using orchestration and automation, while SCAP is more limited in scope
39
SQL injection
40
A port scan
41
192.168.12.21 made a TCP connection to 209.132.177.50
42
Implement MDM
43
Build the chain-of-custody document, noting the media model, serial number, size, vendor, date, and time of acquisition.
44
User acceptance testing
45
Enforce geofencing to limit data accessibility
46
Port mirroring
47
Implement multifactor authentication
48
Isolate the workstations and air gap them when it is feasible
49
Communicate the security incident to the threat team for further review and analysis
50
Run the FTP server n a chroot environment
51
Change management
52
CASB
53
nslookup accountfix-office365.com
54
Determine what attack the odd characters are indicative of.
55
Incident response plan
56
Block the IP range of the scans at the network firewal.
57
Limit user creation to administrators only.
58
Performing input validation before allowing submission
59
Mean time to contain
60
Update the system firmware and reimage the hardware.
61
High GPU utilization
62
Legal department
63
The vulnerability is network based.
64
4
65
Generate a hash value and make a backup image.
66
brady
67
To test possible incident scenarios and how to react properly
68
The digital certificate on the web server was self-signed.
69
Log entry 4
70
Determine the asset value of each system.
71
A new program has been set to execute on system start.
72
SLA
73
Beaconing
74
Deploy EDR on the web server and the database server to reduce the adversary's capabilities., Use microsegmentation to restrict connectivity to/from the web and database servers.
75
Execute commands through an unsecured service account.
76
. Hard-coded credential
77
The host is allowing insecure cipher suites.
78
SOAR
79
Make a forensic image of the device and create a SHA-1 hash.
80
Nation-state
81
Registry
82
Cross-site scripting
83
A social engineering attack is underway.
84
Registry key values
85
letc/shadow
86
Passive scanning
87
Decomission the proxy
88
Time synchronization
89
SOAR
90
Any discovered vulnerabilities will not be remediated.
91
The root cause analysis identifies the contributing items that facilitated the event.
92
Automation
93
EDR
94
#/bin/bash netstat -antp |grep 8080 >dev/null && echo "Malicious activity" || echo "OK"
95
Implement segmentation with ACLS.
96
Replace the current MD5 with SHA-256.
97
Check configurations to determine whether USB ports are enabled on company assets.
98
TCPDump
99
XSS
100
A wel-defined timeline of the events
security+1
security+1
lopkeda · 100問 · 2年前security+1
security+1
100問 • 2年前security+2
security+2
lopkeda · 100問 · 2年前security+2
security+2
100問 • 2年前security+6
security+6
lopkeda · 100問 · 2年前security+6
security+6
100問 • 2年前security+7
security+7
lopkeda · 100問 · 2年前security+7
security+7
100問 • 2年前security+8
security+8
lopkeda · 100問 · 2年前security+8
security+8
100問 • 2年前security+9
security+9
lopkeda · 100問 · 2年前security+9
security+9
100問 • 2年前security+10
security+10
lopkeda · 100問 · 2年前security+10
security+10
100問 • 2年前security+11
security+11
lopkeda · 100問 · 2年前security+11
security+11
100問 • 2年前security+12
security+12
lopkeda · 64問 · 2年前security+12
security+12
64問 • 2年前cysa+1
cysa+1
lopkeda · 100問 · 2年前cysa+1
cysa+1
100問 • 2年前cysa+3
cysa+3
lopkeda · 54問 · 1年前cysa+3
cysa+3
54問 • 1年前A+1
A+1
lopkeda · 100問 · 1年前A+1
A+1
100問 • 1年前問題一覧
1
Data management policy
2
Geographic access requirements
3
VPN
4
Use built-in functions from libraries to check and handle long numbers properly.
5
Implement port security with one MAC address per network port of the switch.
6
Contact the application owner for connect.example.local for additional information.
7
dd if=ldev/sda of=/mnt/usb/evidence.bin bs=4096; sha512sum /mnt/usblevidence.bin hashlog-Imnt/usblevidence.bin.hashlog Imnt/usblevidence.bin.hash
8
Review the message in a secure environment.
9
Set up a VPN between Company A and Company B, granting access only to the ERPS within the connection.
10
A risk identification process
11
Data enrichment
12
Remove rules 1, 2, and 5.
13
Information is leaking from the memory of host 10.20.30.40
14
DLP
15
802.1X to enforce company policy on BYOD user hardware
16
SSO
17
The IDS rule set
18
output encoding.
19
The company is accepting the inherent risk of the vulnerability.
20
SOAR reduces the amount of human intervention required.
21
The data laws of the country in which the company is located
22
Update lo the secure hypervisor version.
23
Documenting the respective chain of custody, Performing a memory dump of the mobile device for analysis
24
192.168.48.147
25
Spoofing tampering, repudiation, information disclosure, denial of service elevation of privilege
26
Nessus
27
Policy-based access controls
28
an application stress test.
29
Implement a secure supply chain program with governance
30
Spider, Jackal
31
Stack counting
32
Create a data minimization plan.
33
Isolate the container from production using a predefined policy template
34
Enable the browser's XSS filter.
35
Recognize that error messaging does not provide confirmation of the correct element of authentication
36
C.B.A.D
37
Check if temporary files are being monitored
38
SOAR has a wider breadth of capability using orchestration and automation, while SCAP is more limited in scope
39
SQL injection
40
A port scan
41
192.168.12.21 made a TCP connection to 209.132.177.50
42
Implement MDM
43
Build the chain-of-custody document, noting the media model, serial number, size, vendor, date, and time of acquisition.
44
User acceptance testing
45
Enforce geofencing to limit data accessibility
46
Port mirroring
47
Implement multifactor authentication
48
Isolate the workstations and air gap them when it is feasible
49
Communicate the security incident to the threat team for further review and analysis
50
Run the FTP server n a chroot environment
51
Change management
52
CASB
53
nslookup accountfix-office365.com
54
Determine what attack the odd characters are indicative of.
55
Incident response plan
56
Block the IP range of the scans at the network firewal.
57
Limit user creation to administrators only.
58
Performing input validation before allowing submission
59
Mean time to contain
60
Update the system firmware and reimage the hardware.
61
High GPU utilization
62
Legal department
63
The vulnerability is network based.
64
4
65
Generate a hash value and make a backup image.
66
brady
67
To test possible incident scenarios and how to react properly
68
The digital certificate on the web server was self-signed.
69
Log entry 4
70
Determine the asset value of each system.
71
A new program has been set to execute on system start.
72
SLA
73
Beaconing
74
Deploy EDR on the web server and the database server to reduce the adversary's capabilities., Use microsegmentation to restrict connectivity to/from the web and database servers.
75
Execute commands through an unsecured service account.
76
. Hard-coded credential
77
The host is allowing insecure cipher suites.
78
SOAR
79
Make a forensic image of the device and create a SHA-1 hash.
80
Nation-state
81
Registry
82
Cross-site scripting
83
A social engineering attack is underway.
84
Registry key values
85
letc/shadow
86
Passive scanning
87
Decomission the proxy
88
Time synchronization
89
SOAR
90
Any discovered vulnerabilities will not be remediated.
91
The root cause analysis identifies the contributing items that facilitated the event.
92
Automation
93
EDR
94
#/bin/bash netstat -antp |grep 8080 >dev/null && echo "Malicious activity" || echo "OK"
95
Implement segmentation with ACLS.
96
Replace the current MD5 with SHA-256.
97
Check configurations to determine whether USB ports are enabled on company assets.
98
TCPDump
99
XSS
100
A wel-defined timeline of the events